Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-12-2022 19:11
Static task
static1
Behavioral task
behavioral1
Sample
REPORT_HZ6711.lnk
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
REPORT_HZ6711.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
YouContractChanges/YouContractChanges.cmd
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
YouContractChanges/YouContractChanges.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
YouContractChanges/YouNewRules.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
YouContractChanges/YouNewRules.dll
Resource
win10v2004-20221111-en
General
-
Target
YouContractChanges/YouNewRules.dll
-
Size
516KB
-
MD5
934ce14971f8b392035091f6c4b8359b
-
SHA1
1c64dc1cf040e89834a787722ed49367d515184c
-
SHA256
0e1f44187d73e706600e63c7ffb8132be360e44962a4f6ef2e34f53cdd8681b2
-
SHA512
0cc8d1645913f8a44cfd7d7f5a1e83f5416637f62ce54cf07fee88673d81c567598633dac60dcc38484a12cb4f3a329326690b642e01e6a7ced4824a7ac3e147
-
SSDEEP
6144:wiIqnct7uycRpLrFPQleGc2BpeQvfTiD3MJIyFX+OwjzK9y9KOc6rXPMATcBu:wihnctArBgRprvbiIIAuz19nTMAgc
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1132 wrote to memory of 1172 1132 rundll32.exe rundll32.exe PID 1132 wrote to memory of 1172 1132 rundll32.exe rundll32.exe PID 1132 wrote to memory of 1172 1132 rundll32.exe rundll32.exe PID 1132 wrote to memory of 1172 1132 rundll32.exe rundll32.exe PID 1132 wrote to memory of 1172 1132 rundll32.exe rundll32.exe PID 1132 wrote to memory of 1172 1132 rundll32.exe rundll32.exe PID 1132 wrote to memory of 1172 1132 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\YouContractChanges\YouNewRules.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\YouContractChanges\YouNewRules.dll,#12⤵